-
公开(公告)号:US11750378B1
公开(公告)日:2023-09-05
申请号:US17930754
申请日:2022-09-09
Applicant: Wells Fargo Bank, N.A.
Inventor: Robert L. Carter, Jr. , Ravi K. Maganti , Bradford A. Shea , M. Erik Meinholz , Jeff J. Stapleton , Peter Bordow , Pierre Arbajian , Abhijit Rao
CPC classification number: H04L9/0852 , G06F21/577 , G06F21/602
Abstract: Systems, apparatuses, methods, and computer program products are disclosed for post-quantum cryptography (PQC). An example method includes receiving data, a set of data attributes about the data, and a risk profile data structure indicative of a vulnerability of the data in a PQC data environment. The example method further includes retrieving PQC cryptographic performance information associated with a set of PQC cryptographic techniques. The PQC cryptographic performance information may comprise a set of PQC cryptographic performance attributes for each PQC cryptographic technique in the set of PQC cryptographic techniques. The example method further includes generating a set of PQC encryption attributes for encrypting the data based on the set of data attributes, the risk profile data structure, and the PQC cryptographic performance information. Subsequently, the example method includes encrypting the data based on the set of PQC encryption attributes.
-
公开(公告)号:US20230273989A1
公开(公告)日:2023-08-31
申请号:US18143498
申请日:2023-05-04
Applicant: Wells Fargo Bank, N.A.
Inventor: Peter Bordow
CPC classification number: G06F21/45 , G06F21/32 , H04L63/083 , H04L63/0853 , H04L63/0861 , H04W12/068 , G06F3/04847
Abstract: Disclosed are example methods, systems, and devices that allow for generation and maintenance of a central identity databank for a user’s digital life. The identity databank may include identity elements with payload values and metadata values corresponding immutable attributes of the user. A multifactor identity authentication protocol allows service provider devices to more reliably validate transactions with user devices via an identity system. The identity databank may include passwords, which may be generated by the identity system linked to user accounts and/or service providers. The passwords may be provided to service provider devices, eliminating the need for users to conceive of a multitude of varying passwords for the user’s accounts.
-
公开(公告)号:US11477016B1
公开(公告)日:2022-10-18
申请号:US16566009
申请日:2019-09-10
Applicant: WELLS FARGO BANK, N.A.
Inventor: Robert L. Carter, Jr. , Ravi K. Maganti , Bradford A. Shea , M. Erik Meinholz , Jeff J. Stapleton , Peter Bordow , Pierre Arbajian , Abhijit Rao
Abstract: Systems, apparatuses, methods, and computer program products are disclosed for post-quantum cryptography (PQC). An example method includes receiving data, a set of data attributes about the data, and a risk profile data structure indicative of a vulnerability of the data in a PQC data environment. The example method further includes retrieving PQC cryptographic performance information associated with a set of PQC cryptographic techniques. The PQC cryptographic performance information may comprise a set of PQC cryptographic performance attributes for each PQC cryptographic technique in the set of PQC cryptographic techniques. The example method further includes generating a set of PQC encryption attributes for encrypting the data based on the set of data attributes, the risk profile data structure, and the PQC cryptographic performance information. Subsequently, the example method includes encrypting the data based on the set of PQC encryption attributes.
-
公开(公告)号:US11343270B1
公开(公告)日:2022-05-24
申请号:US16566151
申请日:2019-09-10
Applicant: WELLS FARGO BANK, N.A.
Inventor: Robert L. Carter, Jr. , Ravi K. Maganti , Bradford A. Shea , M. Erik Meinholz , Jeff J. Stapleton , Peter Bordow , Pierre Arbajian , Abhijit Rao
Abstract: Systems, apparatuses, methods, and computer program products are disclosed for post-quantum cryptography (PQC). An example method includes receiving data. The example method further includes retrieving policy information associated with the data. The example method further includes generating a set of policy attributes about the data based on the data and the policy information. Subsequently, the example method includes generating a risk profile data structure based on the set of policy attributes. The risk profile data structure may be indicative of a vulnerability of the data in a PQC data environment.
-
公开(公告)号:US11336462B1
公开(公告)日:2022-05-17
申请号:US16566026
申请日:2019-09-10
Applicant: WELLS FARGO BANK, N.A.
Inventor: Ravi K. Maganti , Robert L. Carter, Jr. , Bradford A. Shea , M. Erik Meinholz , Jeff J. Stapleton , Peter Bordow , Pierre Arbajian , Abhijit Rao
Abstract: Systems, apparatuses, methods, and computer program products are disclosed for quantum computing (QC) detection. An example method includes generating QC detection data. The example method further includes generating a pair of asymmetric cryptographic keys comprising a public cryptographic key and a private cryptographic key, generating encrypted QC detection data based on the pair of asymmetric cryptographic keys, and destroying the private cryptographic key. The example method further includes monitoring a set of data environments for electronic information related to the encrypted QC detection data. Subsequently, the example method may include generating a QC detection alert control signal in response to detection of the electronic information related to the encrypted QC detection data.
-
公开(公告)号:US11218300B1
公开(公告)日:2022-01-04
申请号:US16566033
申请日:2019-09-10
Applicant: WELLS FARGO BANK, N.A.
Inventor: Bradford A. Shea , M. Erik Meinholz , Robert L. Carter, Jr. , Jeff J. Stapleton , Pierre Arbajian , Abhijit Rao , Peter Bordow , Ravi K. Maganti
Abstract: Systems, apparatuses, methods, and computer program products are disclosed for PQC. An example method includes transmitting a first portion of an electronic communication to a client device over a non-PQC communications channel. The example method further includes transmitting a second portion of the electronic communication to a PQC add-on device over a PQC communications channel, wherein the PQC add-on device is communicatively coupled to the client device. In some instances, the first portion of the electronic communication may comprise overhead data, and the second portion of the electronic communication may comprise payload data.
-
公开(公告)号:US20250035676A1
公开(公告)日:2025-01-30
申请号:US18066162
申请日:2022-12-14
Applicant: Wells Fargo Bank, N.A.
Inventor: Peter Bordow , Boris Beltinoff , Dale C. Miller , Charlee Alexandra Stefanski , Richard Orlando Toohey
Abstract: Detecting a level of current in a conductor such as a power line can be accomplished using sensing devices that are coupled to the line. Such devices can have a clamshell or briefcase-style shape and close about the line. The line passes through a channel between the sides of the device. A quantum substance made of a material having a phonon decay sideband is arranged nearby the channel, and a light source and a scanning source work in tandem to cause the substance to emit light that can be analyzed to determine a magnitude of a magnetic field on the substance. By distributing such sensing devices about a grid or other electrical distribution network, current throughout the network can be collected and analyzed to ascertain the presence and location of interferences with the grid.
-
公开(公告)号:US20250030686A1
公开(公告)日:2025-01-23
申请号:US17445062
申请日:2021-08-13
Applicant: Wells Fargo Bank, N.A.
Inventor: Richard Toohey , Jeff J. Stapleton , Michael Erik Meinholz , Peter Bordow , Ilber Gashi
Abstract: Systems, apparatuses, methods, and computer program products are disclosed for authenticating devices. An example method includes generating pairs of entangled photons by a first device. One photon of each entangled photon pair may be transmitted to a second device. The first device and the second device may attempt to measure respective photons of the entangled photon pair to obtain a bit of a bit sequence. The bits may be encoded in the polarizations of the entangled photon pairs and may correspond to a true random number due to the generation method used by the first device. The second device may provide authentication data based on the bit sequence to the first device. The first device may use its copy of the bit sequence and the authentication data to authenticate the second device.
-
公开(公告)号:US20240411856A1
公开(公告)日:2024-12-12
申请号:US18808513
申请日:2024-08-19
Applicant: Wells Fargo Bank, N.A.
Inventor: Peter Bordow
IPC: G06F21/45 , G06F3/04847 , G06F21/32 , H04L9/40 , H04W12/06
Abstract: Disclosed are example methods, systems, and devices that allow for generation and maintenance of a central identity databank for a user's digital life. The identity databank may include identity elements with payload values and metadata values corresponding immutable attributes of the user. A multifactor identity authentication protocol allows service provider devices to more reliably validate transactions with user devices via an identity system. The identity databank may include passwords, which may be generated by the identity system linked to user accounts and/or service providers. The passwords may be provided to service provider devices, eliminating the need for users to conceive of a multitude of varying passwords for the user's accounts.
-
30.
公开(公告)号:US11995194B1
公开(公告)日:2024-05-28
申请号:US16810962
申请日:2020-03-06
Applicant: Wells Fargo Bank, N.A.
Inventor: Brad A. Shea , Jeff J. Stapleton , Robert L. Carter, Jr. , Pierre Arbajian , Peter Bordow , Michael Erik Meinholz
CPC classification number: G06F21/602 , G06N10/00 , H04L9/0852
Abstract: An encrypting entity encrypts an instance of data using a cryptographic key and a cryptographic technique to generate the encrypted data instance; generates a decryption application based on the cryptographic key and at least one credential, the decryption application configured to decrypt the encrypted data instance; bundles the encrypted data instance and the decryption application to generate an encryption bundle; and provides the encryption bundle to be stored by an external data repository. In an example embodiment, the cryptographic technique is a post-quantum cryptographic technique.
-
-
-
-
-
-
-
-
-